A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security
☆98Sep 10, 2022Updated 3 years ago
Alternatives and similar repositories for protect
Users that are interested in protect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PVSS & Scrape in rust☆11Apr 6, 2026Updated last week
- The library implements a simple Publicly Verifiable Secret Sharing(PVSS) scheme in Rust.☆27Mar 18, 2026Updated 3 weeks ago
- Python implementation of the HydRand protocol☆18Oct 18, 2022Updated 3 years ago
- Pythia server (prototype) implementation☆13Nov 8, 2018Updated 7 years ago
- Publicly Verifiable Secret Sharing, and more...☆28Nov 19, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Feb 7, 2024Updated 2 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- ☆36Jul 5, 2018Updated 7 years ago
- A Rust implementation of the Lamport one-time signature scheme☆15Nov 30, 2022Updated 3 years ago
- Secure Multi-Party Computation (MPC) framework written in Go. Implements two-party garbled circuits (Yao) and the Goldreich-Micali-Wigder…☆129Mar 25, 2026Updated 3 weeks ago
- ☆21Feb 21, 2018Updated 8 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48May 3, 2019Updated 6 years ago
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 5 years ago
- MPC Simulation Framework☆24Jan 7, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Homomorphic Encryption Randomness Beacon☆13Dec 3, 2019Updated 6 years ago
- Private and Reliable Neural Network Inference (CCS '22)☆22Jul 11, 2023Updated 2 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Jul 10, 2020Updated 5 years ago
- DKG for BLS threshold signature scheme on the EVM using solidity☆32Jan 13, 2019Updated 7 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Basic interaction with the Compound suite of smart contracts☆13Jan 24, 2023Updated 3 years ago
- Elliptic curve operations implemented in solidity☆13Oct 21, 2018Updated 7 years ago
- Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP☆21Dec 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Randhound and Randherd implementation for IEEE SnP '17 paper☆16Jul 11, 2017Updated 8 years ago
- A single dependency Ethereum ABI encoder/decoder. Also handles signature parsing and generation!☆21Feb 27, 2026Updated last month
- Reference implementation of Mel☆32Jun 21, 2024Updated last year
- An implementation of Publicly Verifiably Secret Sharing (PVSS) in Swift.☆13Nov 8, 2017Updated 8 years ago
- Ximix is a network application offering threshold key generation, signatures, decryption, and a RPC style MixNet☆19Apr 28, 2017Updated 8 years ago
- ☆17May 23, 2024Updated last year
- PBMX is a Rust toolkit for creating secure and fair play-by-mail games☆11Jan 20, 2023Updated 3 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- ☆11Jul 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- Implementation of the FROST protocol for threshold Ed25519 signing☆76Feb 19, 2026Updated last month
- Experiments with pBFT☆22Dec 8, 2017Updated 8 years ago
- Protecting cryptographic signing keys and seed secrets with Multi-Party Computation.☆481Jul 28, 2022Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago